Preventing Frame Fingerprinting in Controller Area Network Through Traffic Mutation

Mon, 16 May 2022ยท
Alessio Buscemi
Ion Turcanu
Ion Turcanu
,
German Castignani
,
Thomas Engel
ยท 0 min read
Abstract
The continuous increase of connectivity in commercial vehicles is leading to a higher number of remote access points to the Controller Area Network (CAN) โ€“ the most popular in-vehicle network system. This factor, coupled with the absence of encryption in the communication protocol, poses serious threats to the security of the CAN bus. Recently, it has been demonstrated that CAN data can be reverse engineered via frame fingerprinting, i.e., identification of frames based on statistical traffic analysis. Such a methodology allows fully remote decoding of in-vehicle data and paves the way for remote pre-compiled vehicle-agnostic attacks. In this work, we propose a first solution against CAN frame fingerprinting based on mutating the traffic without applying modifications to the CAN protocol. The results show that the proposed methodology halves the accuracy of CAN frame fingerprinting.
Type
Publication
2022 IEEE International Conference on Communications Workshops